Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-01-27 | CVE-2016-5547 | Unspecified vulnerability in Oracle Jdk, JRE and Jrockit Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). | 5.3 |
2017-01-27 | CVE-2016-5546 | Unspecified vulnerability in Oracle Jdk, JRE and Jrockit Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). | 7.5 |
2017-01-27 | CVE-2016-5545 | 7PK - Security Features vulnerability in Oracle VM Virtualbox Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: GUI). | 6.3 |
2017-01-27 | CVE-2016-5541 | Unspecified vulnerability in Oracle Mysql Cluster Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: NDBAPI). | 4.8 |
2017-01-27 | CVE-2016-5528 | Unspecified vulnerability in Oracle Glassfish Server 2.1.1/3.0.1/3.1.2 Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). | 9.0 |
2017-01-27 | CVE-2016-5509 | Unspecified vulnerability in Oracle Flexcube Investor Servicing Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Core). | 3.1 |
2017-01-27 | CVE-2016-5822 | Resource Management Errors vulnerability in Huawei Oceanstor 5800 V3 V300R002C10 Huawei Oceanstor 5800 before V300R002C10SPC100 allows remote attackers to cause a denial of service (CPU consumption) via a large number of crafted HTTP packets. | 7.5 |
2017-01-27 | CVE-2016-3996 | Information Exposure vulnerability in Samsung Knox 1.0/2.3.0 ClipboardDataMgr in Samsung KNOX 1.0.0 and 2.3.0 does not properly check the caller, which allows local users to read KNOX clipboard data via a crafted application. | 5.5 |
2017-01-27 | CVE-2016-1920 | Improper Access Control vulnerability in Samsung Knox 1.0 Samsung KNOX 1.0.0 uses the shared certificate on Android, which allows local users to conduct man-in-the-middle attacks as demonstrated by installing a certificate and running a VPN service. | 5.5 |
2017-01-27 | CVE-2016-1919 | Information Exposure vulnerability in Samsung Knox 1.0 Samsung KNOX 1.0 uses a weak eCryptFS Key generation algorithm, which makes it easier for local users to obtain sensitive information by leveraging knowledge of the TIMA key and a brute-force attack. | 4.7 |